Lisa, a network administrator, wants to be able to block all already known malicious activity. Which
of the following would allow her to perform this activity?
A.
Behavioral Based IDS
B.
Signature Based IDS
C.
Behavioral Based IPS
D.
Signature Based IPS